نتایج جستجو برای: covert channel
تعداد نتایج: 228225 فیلتر نتایج به سال:
Covert channels aim to hide the existence of communication between two or more parties. Such channels typically utilise pre-existing overt data transmissions to carry hidden messages. Recently, Murdoch proposed a temperature-based covert channel where information is transmitted by remotely inducing and measuring changes of temperature of an intermediate/target host. The channel was invented mai...
We consider the problem of communication over a continuous-time Poisson channel subject to covertness constraint: The relative entropy between output distributions when message is transmitted and no input provided must be small. In absence both bandwidth peak-power constraints, we show covert capacity this channel, in nats per second, infinity. When constraint imposed on input, becomes zero, “s...
Covert Channel are the methods to conceal a message in the volatile medium carrier such as radio signal and network packets. Until now, covert channels based on the packet length produce abnormal packet length when the length of the message is long. Abnormal packet length, especially in the normal network will expose the covert channels to network security perimeter. Therefore, it motivates the...
The advanced development of computer networks and communication technologies has made covert communications easier to construct, faster, undetectable more secure than ever. A channel is a path through which secret messages can be leaked by violating system security policy. detection such dangerous, unwatchable, hidden threats still one the most challenging aspects. This threat exploits methods ...
Covert channels and tunneling approaches are becoming a severe threat to information security. Penetration tools are employed to transit sensitive information through authorized streams. Since many current solutions are based on expert’s experiences or latter-wit, a self-learning detection and analysis system is starved for. A data mining framework for Covert Channel Detection and Analysis Syst...
The long-term goal of this work is an integrated defense system that provides protection of Navy assets, while in port, from the threat posed by covert swimmers. The general concept is to hail, deter, and/or incapacitate the threat by directing a controlled level of low-frequency acoustic energy at the target location. At the system level, the concept requires combining elements of target detec...
Covert channels are information leaks in systems that use resources to transfer secretly a message. They are a threat for security, performance, but also for a system’s profitability. This paper proposes a new approach to detect covert channels from scenario models of protocols. The problem of finding covert channels in scenarios is first modeled as a game, in which a pair of malicious users {S...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید